Paper
29 April 2002 Comparison of two speech content authentication approaches
Author Affiliations +
Proceedings Volume 4675, Security and Watermarking of Multimedia Contents IV; (2002) https://doi.org/10.1117/12.465272
Event: Electronic Imaging, 2002, San Jose, California, United States
Abstract
Speech content authentication, which is also called speech content integrity or tamper detection, protects the integrity of speech contents instead of the bitstream itself. In this work, two major approaches for flexible speech authentication are presented and compared. The first scheme is based on content feature extraction that is integrated with CELP speech coders to minimize the total computational cost. Speech features relevant to semantic meaning are extracted, encrypted and attached as the header information. The second method embeds fragile watermarks into the speech signal in the frequency domain. If the speech signal is tampered, the secret watermark sequence is also modified. The receiver detects the fragile watermark from received data and compares it to the original secret sequence. These two approaches are compared in terms of computational complexity, false detection rate, and tolerance to mis-synchronization and content preserving operations. It is shown that each approach has its own merits and shortcomings.
© (2002) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Chung-Ping Wu and C.-C. Jay Kuo "Comparison of two speech content authentication approaches", Proc. SPIE 4675, Security and Watermarking of Multimedia Contents IV, (29 April 2002); https://doi.org/10.1117/12.465272
Lens.org Logo
CITATIONS
Cited by 15 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Digital watermarking

Feature extraction

Signal to noise ratio

Receivers

Quantization

Signal detection

Modulation

RELATED CONTENT


Back to Top